Source: https://repo.zenk-security.com/Cryptographie%20.%20Algorithmes%20.%20Steganographie/Cryptographie%20asymetrique%20%20L%20exemple%20de%20RSA.pdf